Head of the Press Office
Phone: +49 (0) 52 41 80 24 66
Subject: Media & Services
There is no question that the digitization of a company brings tremendous opportunities, but it also brings new risks – particularly with regard to data security. The very ability to make information available accurately, securely and confidentially, and to process it smoothly is often a crucial competitive factor. At the same time, there are increased opportunities for cyber criminals to operate ever more professionally - and therefore more dangerously. This presents a major challenge for the public and private sector. We spoke with Carsten Bittner, who as Chief Information Security Officer is responsible for information security and IT governance at Bertelsmann, about how things stand regarding IT security at Bertelsmann.
Carsten Bittner: Bertelsmann has made tangible progress on information security in recent years. With our Information Security Management System, we've created an exemplary framework that now needs to be fleshed out. We work closely and purposefully with all divisions on joint, cross-divisional measures. In addition, there are a number of individual measures in place at our companies that are making things harder for cyber criminals. But defense against cyber-attack remains a challenge, because both sides are constantly expanding and upgrading their arsenal.
Carsten Bittner: We're seeing a growing number of targeted attacks that are also becoming more and more professional. The methods used are developing rapidly in line with state-of-the-art technology. So we're essentially in a race in which standing still means falling behind, and constantly need to improve ourselves as a result. It's also challenging that an attacker only needs to find one loophole, whereas we need to identify and secure a whole slew of loopholes. This “weapons inequality” lies at the heart of the challenge.
Carsten Bittner: We use the structures we've established across Bertelsmann in recent years under what we call the ISMS (Information Security Management System). We regularly check the security of our digital assets for loopholes. This includes such things as contract and customer data, but also media content, as well as process and financial information. In each case this takes place at company level, involving a company executive and the information security officer. Risks are evaluated according to how critical they are and how expensive it would be to fix them. Depending on the result, they are then either addressed or accepted as part of the business. This approach ensures that we systematically eliminate the biggest weak points first.
Carsten Bittner: The resulting damage can be difficult to quantify. First, it's difficult enough to calculate the damage caused by a known incident as it involves indirect effects such as image damage as well as direct impacts, such as the failure of IT systems. Secondly, the number of unreported cases is high. For example, data breaches often go unnoticed. In addition to the theft of sensitive data, hackers often attempt to blackmail their victims. For example, malware is planted in a computer that encrypts important business data, and the key will be issued only upon payment. There is also fraud and identity theft, i.e. stealing passwords or other login information. Both are regularly used to trigger payments from company accounts to foreign accounts abroad. Here it helps to specifically raise employee's awareness of the security issue.
Carsten Bittner: The most important thing is to build awareness among our coworkers. All too often, digital naivety still prevails – and it is shamelessly exploited. So building awareness among employees is one of our absolute top priorities. No technology in the world can replace circumspect employee behavior. Because we know this, we set up a cross-divisional working group and have developed a customized new training course that addresses typical situations in everyday working life and increases awareness of the information security issue. The course is aimed at all employees. We will launch it soon.
Carsten Bittner: I wouldn't call it competition as we are ultimately pursuing the same goals: to make the opportunities of digital technologies available for innovative businesses. And in such a way that our digital crown jewels are protected at the same time. Of course this also leads to discussions, such as when certain minimum requirements are not met for the sake of speeding up the implementation of a project. In most cases, we work very well and closely with the businesses. Information security is not an end in itself – it's also a way to make sure that the businesses to enjoy sustained success. We support the businesses and in no way see ourselves as information security police officers.